06:15 PM

WAN Security: Your Next Assignment

Firewalls and IDS aren't enough. WAN security pros must embrace data-centric protection.

Congratulations: WAN security pros have locked down the network layer. Core security technologies such as firewalls and intrusion detection and prevention systems are in place at a majority of companies, according to a recent survey from InformationWeek Analytics. But when it comes to technologies that focus on applications and data, WAN security teams have some catching up to do.

Less than half of respondents use Web application firewalls (see chart). Even more surprising, only 40% have Web or gateway-based antivirus technology in place. In an age when Web ports are wide open on the network firewall, it's astounding that this product isn't more widely deployed.

We're also concerned to see data loss prevention (DLP) technology at the bottom of the list, at 24%. While DLP does present some challenges, we expected a higher level of deployment given the ease with which data can be moved or exposed.

One likely reason is that DLP requires a high level of cooperation and coordination among multiple areas of the business, including management, security, legal, and HR, and such levels of coordination can be difficult to achieve.

DLP also presents technical and operational challenges. The system has to be properly trained to identify confidential information, and companies have to devote resources to monitor the system and respond to policy violations.

WAN Security
Your Next Assignment

That said, the importance of DLP is clear for companies that deal with personally identifiable information such as credit card or Social Security numbers. And don't forget day-to-day business data being passed around in Word and Excel files; it can be even more important than personal information. You may think critical data isn't traversing the WAN, but we'll bet that a closer look at e-mail and Office documents would reveal a mother lode of sensitive information.

We're pleased to see that organizations have heeded the call from WAN security engineers to protect the network. But the landscape has changed, and WAN security must change with it. IT security professionals need to take a more active role in monitoring and protecting the information that flows over WAN pipes, in addition to securing the connections themselves.

chart: What security systems do you have in place for the WAN?

Michael A. Davis is the CEO of Savid Technologies, a technology and security consulting firm based in Chicago. Write to us at [email protected].

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Latest Comment: nice one good
Current Issue
E-Commerce Security: What Every Enterprise Needs to Know
The mainstream use of EMV smartcards in the US has experts predicting an increase in online fraud. Organizations will need to look at new tools and processes for building better breach detection and response capabilities.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Join Dark Reading community editor Marilyn Cohodas in a thought-provoking discussion about the evolving role of the CISO.